OWASP Top 10 Mobile Risks

CEO/Founder at nVisium Security Inc.
Sep. 27, 2011
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
OWASP Top 10 Mobile Risks
1 of 44

More Related Content

Recently uploaded

How SACCOs can increase their memberships  AD_compressed (1).pdfHow SACCOs can increase their memberships  AD_compressed (1).pdf
How SACCOs can increase their memberships AD_compressed (1).pdfCoretecDigital
GDSC INFO.pptxGDSC INFO.pptx
GDSC INFO.pptxAshishChanchal1
FewShotExamples.pptxFewShotExamples.pptx
FewShotExamples.pptxAlok Ranjan
Carrom Pool Mod APK.docxCarrom Pool Mod APK.docx
Carrom Pool Mod APK.docxRayJ12
GDSC SRMCEM Info Session 2023GDSC SRMCEM Info Session 2023
GDSC SRMCEM Info Session 2023HariOM Dwivedi
Workshop on IoT and Basic Home Automation_BAIUST.pptxWorkshop on IoT and Basic Home Automation_BAIUST.pptx
Workshop on IoT and Basic Home Automation_BAIUST.pptxRedwan Ferdous

Featured

Staying Cool During SummerStaying Cool During Summer
Staying Cool During SummerDeborah Davis
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software

Featured(20)

OWASP Top 10 Mobile Risks

  1. CEO

  2. Principal Consultant

  3. Principal Consultant

  4. WhyUnique and different security risks

  5. Goal To build security into mobile dev. life cycle

  6. Very different from traditional web app model due to wildly varying use cases and usage patterns

  7. Must consider more than the ‘apps’

  8. Remote web services

  9. Platform integration (iCloud, C2DM)

  10. Focused on areas of risk rather than individual vulnerabilities

  11. Weighted utilizing the OWASP Risk Rating Methodology

  12. https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology

  13. Applies to locally stored data + cloud synced

  14. Generally a result of:

  15. Not encrypting data

  16. Caching data not intended for long-term storage

  17. Weak or global permissions

  18. Credentials disclosed

  19. Privacy violations

  20. Never use public storage areas (ie- SD card)

  21. Leverage secure containers and platform provided file encryption APIs

  22. Not mobile specific per se, but essential to get right

  23. We still can’t trust the client

  24. Luckily, we understand these issues well

  25. Leverage the wealth of knowledge that is already out there

  26. OWASP Web Top 10, Cloud Top 10, Web Services Top 10

  27. Yes, this unfortunately happens often

  28. Weakly encrypted data in transit

  29. Strong encryption, but ignoring security warnings

  30. Ignoring certificate validation errors

  31. Tampering w/ data in transit

  32. When users connected via wifi, apps automatically sent the token in an attempt to automatically synchronize data from server

  33. Sniff this value, impersonate the user

  34. This includes data over carrier networks, WiFi, and even NFC

  35. Pure web apps

  36. Hybrid web/native apps

  37. Some familiar faces

  38. XSS and HTML Injection

  39. SQL Injection

  40. New and exciting twists

  41. Abusing phone dialer + SMS

  42. Toll fraud

  43. Use prepared statements for database calls…concatenation is still bad, and always will be bad

  44. Some apps rely solely on immutable, potentially compromised values (IMEI, IMSI, UUID)

  45. Hardware identifiers persist across data wipes and factory resets

  46. Out-of-band doesn’t work when it’s all the same device

  47. Why? Convenience and usability

  48. Apps maintain sessions via

  49. HTTP cookies

  50. OAuth tokens

  51. SSO authentication services

  52. Unauthorized access

  53. Ensure that tokens can be revoked quickly in the event of a lost/stolen device

  54. Similar but different depending on platform

  55. iOS- Abusing URL Schemes

  56. Android- Abusing Intents

  57. Several attack vectors

  58. Malicious apps

  59. Data exfiltration

  60. Prompt the user for additional authorization before allowing

  61. Sensitive data ends up in unintended places

  62. Web caches

  63. Keystroke logging

  64. Screenshots (ie- iOSbackgrounding)

  65. Logs (system, crash)

  66. Temp directories

  67. Remove sensitive data before screenshots are taken, disable keystroke logging per field, and utilize anti-caching directives for web content

  68. Debug your apps before releasing them to observe files created, written to, or modified in any way

  69. Carefully review any third party libraries you introduce and the data they consume

  70. Broken implementations using strong crypto libraries

  71. Custom, easily defeated crypto implementations

  72. Encoding != encryption

  73. Obfuscation != encryption

  74. Privilege escalation

  75. Leverage battle-tested crypto libraries vice writing your own

  76. Apps can be reverse engineered with relative ease

  77. Code obfuscation raises the bar, but doesn’t eliminate the risk

  78. Commonly found “treasures”:

  79. API keys

  80. Passwords

  81. Keep proprietary and sensitive business logic on the server

  82. RC1 then becomes ‘Final v1.0’

  83. 12 month revision cycle

  84. Rapidly evolving platforms

  85. Stale data = not as useful

  86. We’ve identified the issues…now we have to fix them

  87. Platforms must mature, frameworks must mature, apps must mature

  88. Zach Lanier zach.lanier@intrepidusgroup.comhttp://twitter.com/quine

  89. Mike Zusmanmike.zusman@carvesystems.comhttp://twitter.com/schmoilito